Dear All,
I'd like to share comment by Security AD Stephen Farrell on a work that is 
directly related to BFD, draft-ietf-mpls-lsp-ping-mpls-tp-oam-conf (hope it is 
OK to raise security awareness in BFD community):

> - 2.1.1, is there any chance of moving on from the "Keyed SHA1"
> 
> from RFC5880 to e.g. HMAC-SHA256 for this? We're generally trying to 
> get that kind of transition done as we can and moving to use of a 
> standard integrity check rather than a more home-grown one has some 
> benefits. The HMAC-SHA1-like thing you're doing is still probably ok, 
> (though could maybe do with crypto eyeballs on it as there may have 
> been relevant new results since 2010) but future-proofing would 
> suggest moving to HMAC-SHA256 if we can. (I can imagine such a change 
> might require a new document, but am asking anyway:-)
> 
> GIM>> The fact is that we're bound by what is defined in RFC 5880.

I wonder for how long though, that's now a five year old RFC.
Assuming it takes a few years for new deployments to pick up new algorithms, 
isn't it time that a whole bunch of algorithm choices were revisited?

> There was a proposal to strengthen BFD security BFD Generic 
> Cryptographic  
> Authentication<http://tools.ietf.org/html/draft-bhatia-bfd-crypto-auth-03> 
> but the document had expired.

Pity that.

> - 2.1.1, I'd recommend saying any password auth-type MUST NOT be used - would 
> that be possible?
> 
> GIM>> I think that we’ll need to make changes to RFC 5880 first (5880bis?). 

I don't see any reason why that is true. This document can easily say "you MUST 
NOT use the horribly weak option specified in that old RFC" with changing that 
old RFC.

The point? It may be sacrificing security for sake of performance may be not 
the better choice. I can rationalize such choice for BFD over LSP, micro-BFD as 
these effectively monitor not Layer 3 but Layer 2.5 and Layer 2 entities 
respectively. I would not support such choice for multi-hop BFD. Single-hop 
BFD? Open for discussion.

        Regards,
                Greg

-----Original Message-----
From: Rtg-bfd [mailto:rtg-bfd-boun...@ietf.org] On Behalf Of Dacheng Zhang
Sent: Monday, November 23, 2015 10:26 PM
To: Marc Binderberger; Reshad Rahman (rrahman); 
draft-mahesh-bfd-authenticat...@ietf.org
Cc: rtg-bfd@ietf.org
Subject: Re: Request for WG adoption of draft-mahesh-bfd-authentication

Hi,I think this is an interesting draft. It is quite common that we have make a 
trade off between performance and security. Support for the adoption. ^_^

Some comments and questions:
1) discuss which types of frames MUST be authenticated and which ones SHOULD be 
authentication.
2) There is a discussion about how the sequence number should be increased in 
RFC5880, maybe you could follow that one and so avoid any unnecessary confusion.
3) Q: since in this solution, only a small number of frames need to be 
authenticated, maybe we could consider again to use SHA-2 since the influence 
in the performance brought by the strong algorithms will no longer be that 
serious.
4) Q: do you plan to propose a negotiation mechanism for the peers to decide 
the frames which should be authenticated? If not, please clarify this part of 
work is out of scope.

Cheers

Dacheng

在 15-11-21 下午6:29, "Rtg-bfd on behalf of Marc Binderberger"
<rtg-bfd-boun...@ietf.org on behalf of m...@sniff.de> 写入:

>Hello Reshad and authors (and BFD experts on the list),
>
>it's a smart idea so I support the WG support ;-)
>
>But reading the document: it's at this point mainly outlining an idea 
>and I would expect more details to allow for interoperable 
>implementations.
>
>
>Regards, Marc
>
>
>
>
>
>On Fri, 20 Nov 2015 12:03:25 +0000, Reshad Rahman (rrahman) wrote:
>> BFD WG members,
>> 
>> Please indicate to the WG mailing list whether you would support or 
>> not support BFD WG adoption of the following document.
>> 
>> https://datatracker.ietf.org/doc/draft-mahesh-bfd-authentication/
>> 
>> Authors, as was mentioned at IETF94, you should get your proposal 
>>reviewed  by the security group.
>> 
>> Regards,
>> Jeff & Reshad.


Reply via email to